Dell EMC Elect 2017

Everything you need and nothing you don’t. EMC MOBILE is the essential tool for those of us who live EMC. Now your documentation library is available and in-sync online or off direct from the EMC Cloud

Mikes.eu traffic varies depending on the post. We have a VERY focused audience in the Virtualization, Storage and Cloud Marketing space. We have been ranked in the top 5 of Favorite Independent Blogger and one of the most visited website.

Abstract: In this course, the student will review important topics involved in implementing AppSync, a new product from EMC for replicating applications. The focus will be on the need for AppSync, identifying the components that comprise an AppSync architecture, describing common terminology used in, and explaining an AppSync deployment. The Installation of AppSync will also be presented.

This free eLearning course provides the background information needed to work with the products included in the VMware Security Solution. The course begins with a review of basic security methodologies and how virtualization affects security. References for follow-on reading are provided for students less familiar with these concepts. Next, the course discusses the VMware security strategy. Each product in the VMware Security Solution is introduced by discussing the limitations of traditional security controls and describing how the products in the solution address these limitations. The course concludes with a list of relevant security and compliance online resources.

Objectives:

After this course, you should be able to:• Recognize the process and strategies that security managers use to manage risks to information and information systems• Name ways that virtualization affects security and compliance• List the top vulnerabilities applicable to virtual environments• Explain the basic strategy to protect a virtual environment • Name the main purpose of each product included in the VMware security solution• For each product in the VMware security solution, discuss how key features address the challenges of securing virtual environments with traditional security controls.• Find additional security and compliance resources posted on vmwrae.com

Prerequisites:

None

Outline:

Quick review of security concepts and methodology

- IT security and compliance objectives and process - Control principles - Types of security tools

• Introduction to VMware vCenter Site Recovery Manager (SRM) provides an overview of the challenges that organizations face when a disaster occurs, and how SRM acts as the best disaster recovery product. This module also discusses the benefits that organizations can realize by utilizing the new features that SRM 5.1 provides. • Setting up Protection is the second module, that demonstrates how to install VMware vCenter Site Recovery Manager and set up the protected site. This module discusses how to prepare for an SRM deployment; install SRM; configure SRM; configure vSphere Replication; and create protection groups. • Managing Disaster Recovery is the last module that demonstrates how to create, configure, test, and run disaster recovery plans. This module discusses features that are new in version SRM 5.0 and later, such as reprotection and automated failback. Finally, this module also discusses SRM alarms and some administrative tasks.

Overview: This training course explores new features in VMware vCenter Server™ 5.1 and VMware ESXi™ 5.1.

Objectives:

By the end of the course, you should gain an understanding and should be able to implement the following new functions and features of VMware vSphere® 5.1:• Compute and Storage o Support for hardware version 9, the latest CPU performance counters and virtual shared graphics acceleration designed for enhanced performance. o For better space efficiency vSphere supports storage space reclamation for VDI.